Skip to main content

CVE-2025-3053: CWE-94 Improper Control of Generation of Code ('Code Injection') in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages

High
VulnerabilityCVE-2025-3053cvecve-2025-3053cwe-94
Published: Thu May 15 2025 (05/15/2025, 04:21:49 UTC)
Source: CVE
Vendor/Project: admintwentytwenty
Product: UiPress lite | Effortless custom dashboards, admin themes and pages

Description

The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.5.07 via the uip_process_form_input() function. This is due to the function taking user supplied inputs to execute arbitrary functions with arbitrary data, and does not have any sort of capability check. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary code on the server.

AI-Powered Analysis

AILast updated: 07/06/2025, 10:11:16 UTC

Technical Analysis

CVE-2025-3053 is a critical remote code execution (RCE) vulnerability affecting the UiPress lite WordPress plugin, developed by admintwentytwenty, which provides custom dashboards, admin themes, and pages functionality. The vulnerability exists in all versions up to and including 3.5.07, specifically within the uip_process_form_input() function. This function improperly handles user-supplied input by executing arbitrary functions with arbitrary data without performing any capability or permission checks. As a result, an authenticated attacker with as low as Subscriber-level access can exploit this flaw to execute arbitrary code on the web server hosting the WordPress site. The vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the plugin allows injection of code that is then executed, leading to full compromise of the affected system. The CVSS v3.1 base score is 8.8 (high severity), reflecting the network attack vector, low attack complexity, privileges required at the low level (authenticated Subscriber), no user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the low privilege required make this vulnerability a significant threat to WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress for their web presence and using the UiPress lite plugin. Successful exploitation can lead to full server compromise, allowing attackers to steal sensitive data, modify website content, deploy malware, or use the server as a pivot point for further network intrusion. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, compromised websites can be used for phishing or distributing ransomware, impacting business continuity. Given the plugin’s administrative functionality, attackers could also manipulate dashboards and admin themes to hide malicious activity or disrupt operations. The threat is particularly critical for sectors with high-value data or public-facing services, such as government, finance, healthcare, and e-commerce organizations in Europe.

Mitigation Recommendations

Immediate mitigation steps include: 1) Identifying and inventorying all WordPress instances using the UiPress lite plugin. 2) Restricting plugin access by limiting Subscriber-level user accounts and auditing user roles to ensure minimal privileges. 3) Applying any available patches or updates from the vendor as soon as they are released. 4) If patches are unavailable, temporarily disabling or uninstalling the plugin to eliminate the attack surface. 5) Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the uip_process_form_input() function or unusual POST requests to the plugin endpoints. 6) Monitoring server and application logs for signs of exploitation attempts or anomalous activity. 7) Enforcing strict input validation and capability checks in custom code if the plugin is customized. 8) Conducting regular backups and ensuring they are stored offline or in immutable storage to enable recovery in case of compromise. 9) Educating administrators and users about the risks of low-privilege accounts and enforcing strong authentication mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-31T18:21:21.862Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec5c1

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 10:11:16 AM

Last updated: 7/27/2025, 9:50:22 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats